×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [10]
作者
Guo, Li [2]
Li, Yang [2]
Cai, Yi [1]
Chang, Chi... [1]
Chen, X [1]
Chen, Xiao... [1]
更多...
文献类型
期刊论文 [10]
发表日期
2024 [2]
2020 [2]
2019 [1]
2016 [1]
2008 [1]
2007 [1]
更多...
语种
英语 [10]
出处
COMPUTERS ... [3]
COMPUTER C... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
JOURNAL OF... [1]
NETWORKING... [1]
更多...
资助项目
Beijing Ac... [1]
Beijing In... [1]
Beijing Na... [1]
L-3 commun... [1]
Major scie... [1]
Ministry o... [1]
更多...
收录类别
SCI [10]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
发表日期升序
发表日期降序
Structural analysis and vulnerability assessment of the European LNG maritime supply chain network (2018-2020)
期刊论文
OCEAN & COASTAL MANAGEMENT, 2024, 卷号: 253, 页码: 20
作者:
Mei, Qiang
;
Hu, Qinyou
;
Hu, Yu
;
Yang, Yang
;
Liu, Xiliang
;
Huang, Zishuo
;
Wang, Peng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2024/12/06
Liquefied natural gas
Supply chain security
Maritime transportation network
Vulnerability
Community evolution
Graph deep learning
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 6604-6619
作者:
Liu, Zizhen
;
He, Weiyang
;
Chang, Chip-Hong
;
Ye, Jing
;
Li, Huawei
;
Li, Xiaowei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/12/06
Data models
Servers
Training
Hidden Markov models
Training data
Adaptation models
Security
Federated learning
poisoning attack
knowledge distillation
attention maps
deep neural network
Security risk and response analysis of typical application architecture of information and communication blockchain
期刊论文
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:
Zhao, Hongwei
;
Zhang, Moli
;
Wang, Shi
;
Li, Entang
;
Guo, Zhenhua
;
Sun, Dianmin
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2021/12/01
Information and communication blockchain
Network security risks
Homomorphic verifiable secret sharing
Risk response
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:
Cai, Yi
;
Chen, Xiaoming
;
Tian, Lu
;
Wang, Yu
;
Yang, Huazhong
收藏
  |  
浏览/下载:328/0
  |  
提交时间:2020/12/10
Artificial neural networks
Nonvolatile memory
Encryption
Computational modeling
Hardware
Non-volatile memory (NVM)
compute-in-memory (CIM)
neural network
security
encryption
Context aware intrusion detection for building automation systems
期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:
Pan, Zhiwen
;
Hariri, Salim
;
Pacheco, Jesus
收藏
  |  
浏览/下载:85/0
  |  
提交时间:2019/12/10
Internet of Things
Network security
Context awareness
Supervised learning
Data mining
Intrusion detection
Causality reasoning about network events for detecting stealthy malware activities
期刊论文
COMPUTERS & SECURITY, 2016, 卷号: 58, 页码: 180-198
作者:
Zhang, Hao
;
Yao, Danfeng (Daphne)
;
Rarnakrishnan, Naren
;
Zhang, Zhibin
收藏
  |  
浏览/下载:49/0
  |  
提交时间:2019/12/13
Network security
Anomaly detection
Stealthy maiware
Traffic analysis
Dependence analysis
Machine learning classification
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms
期刊论文
COMPUTER COMMUNICATIONS, 2008, 卷号: 31, 期号: 17, 页码: 4018-4025
作者:
Li, Yang
;
Guo, Li
;
Tian, Zhi-Hong
;
Lu, Tian-Bo
收藏
  |  
浏览/下载:49/0
  |  
提交时间:2019/12/16
Network security
Web server anomaly detection
TCM-KNN algorithm
Genetic algorithm
An active learning based TCM-KNN algorithm for supervised network intrusion detection
期刊论文
COMPUTERS & SECURITY, 2007, 卷号: 26, 期号: 7-8, 页码: 459-467
作者:
Li, Yang
;
Guo, Li
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2019/12/16
network security
intrusion detection
TCM-KNN (Transductive Confidence Machines for K-Nearest Neighbors)
algorithm
machine learning
active learning
Topologically-aware AAA overlay network in mobile IPv6 environment
期刊论文
NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, 卷号: 3976, 页码: 293-306
作者:
Li, Jun
;
Ye, Xin-ming
;
Tian, Ye
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2019/12/16
mobile IPv6
AAA
overlay network
performance
security
A novel computer architecture to prevent destruction by viruses
期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 卷号: 17, 期号: 3, 页码: 241-248
作者:
Gao, QH
;
Hu, Y
;
Li, L
;
Chen, X
;
Liu, HL
收藏
  |  
浏览/下载:77/0
  |  
提交时间:2019/12/16
computer architecture
network security
computer virus